
Trojans masquerading as DeepSeek and Grok clients
We found several groups of sites mimicking official websites of the DeepSeek and Grok chatbots. Fake sites distribute malware under the guise of non-existent chatbot clients for Windows.
3930 articles
We found several groups of sites mimicking official websites of the DeepSeek and Grok chatbots. Fake sites distribute malware under the guise of non-existent chatbot clients for Windows.
Cybercriminals are blackmailing YouTube bloggers into posting malware links in their video descriptions.
What information does an MDR service need to protect a company from complex targeted attacks?
Online converters are a tempting but dangerous way to change file formats. We tell you how to convert files and not get trojanized.
A vulnerability in Google OAuth allows attackers to access accounts of defunct organizations through abandoned domains.
We break down the most covert mechanism of smartphone surveillance using real-life examples.
A step-by-step guide to scanning disk arrays weighing tens of terabytes with the aid of Kaspersky products.
We discovered over 200 repositories with fake projects on GitHub. Using them, attackers distribute stealers, clippers, and backdoors.
Eight signs your WhatsApp account has been stolen — and steps to recover and protect it.
A year after the ransomware attack on healthcare giant UnitedHealth Group, we’ve compiled all publicly available information about the incident and its aftermath.
Just a few hours before 2025, we recorded a surge in cryptominer distribution through video games. Interestingly, not only home PCs but also corporate machines were affected.
The recent leak at major location-data broker, Gravy Analytics, shines a light on the implications of mass location-data collection.
If you still think that Steam, Google Play, and the App Store are malware-free, then read this fascinating story about PirateFi and other hacker creations disguised as games.
Everything you wanted to know about meme cryptocurrencies — such as TRUMP and DOGE — and ways to win or lose big.
We look into every method of hijacking WhatsApp, Telegram, and other messaging accounts – from quishing to fake gifts and viruses, and ways to protect yourself against them.
We examine a special breed of scams aimed at lovers, married couples, and singles. Read on to learn how to avoid falling for “Brad Pitt”.
New research demonstrates for the first time how hardware vulnerabilities in modern CPUs can be exploited in practice.
We’ve discovered apps in the official Apple and Google stores that steal cryptocurrency wallet data by analyzing photos.
It feels as if spam is as old as the internet itself. The post looks at the money-making scams devised over the years, and how to avoid them today.
$3 billion worth of damage to healthcare insurance giant, schools closed, soccer club players’ data leaked, and other ransomware incidents in 2024.